Hash: SHA512

Package        : bind9
Version        : 1:9.8.4.dfsg.P1-6+nmu2+deb7u17
CVE ID         : CVE-2017-3142 CVE-2017-3143


CVE-2017-3142

     An attacker who is able to send and receive messages to an authoritative
     DNS server and who has knowledge of a valid TSIG key name may be able to
     circumvent TSIG authentication of AXFR requests via a carefully constructed
     request packet. A server that relies solely on TSIG keys for protection
     with no other ACL protection could be manipulated into:
     - providing an AXFR of a zone to an unauthorized recipient
     - accepting bogus NOTIFY packets

CVE-2017-3143

     An attacker who is able to send and receive messages to an authoritative
     DNS server and who has knowledge of a valid TSIG key name for the zone and
     service being targeted may be able to manipulate BIND into accepting an
     unauthorized dynamic update.


For Debian 7 "Wheezy", these problems have been fixed in version
1:9.8.4.dfsg.P1-6+nmu2+deb7u17.

We recommend that you upgrade your bind9 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-1025-1: bind9 security update

July 13, 2017
CVE-2017-3142 An attacker who is able to send and receive messages to an authoritative

Summary

CVE-2017-3142

An attacker who is able to send and receive messages to an authoritative
DNS server and who has knowledge of a valid TSIG key name may be able to
circumvent TSIG authentication of AXFR requests via a carefully constructed
request packet. A server that relies solely on TSIG keys for protection
with no other ACL protection could be manipulated into:
- providing an AXFR of a zone to an unauthorized recipient
- accepting bogus NOTIFY packets

CVE-2017-3143

An attacker who is able to send and receive messages to an authoritative
DNS server and who has knowledge of a valid TSIG key name for the zone and
service being targeted may be able to manipulate BIND into accepting an
unauthorized dynamic update.


For Debian 7 "Wheezy", these problems have been fixed in version
1:9.8.4.dfsg.P1-6+nmu2+deb7u17.

We recommend that you upgrade your bind9 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



Severity
Package : bind9
Version : 1:9.8.4.dfsg.P1-6+nmu2+deb7u17
CVE ID : CVE-2017-3142 CVE-2017-3143

Related News